Static task
static1
Behavioral task
behavioral1
Sample
b4c7895d3df188de4df6095d6ce668fe.exe
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
b4c7895d3df188de4df6095d6ce668fe.exe
Resource
win10v2004-20240226-en
General
-
Target
b4c7895d3df188de4df6095d6ce668fe
-
Size
52KB
-
MD5
b4c7895d3df188de4df6095d6ce668fe
-
SHA1
edf83d8ba2e96d957d8e459a112bbdc07ab50668
-
SHA256
679e72becf0f3f58d073001b760f514b720e0e1c42ab3232795b6ad24bfe7731
-
SHA512
b2dc84d5527edba226f599e8f467fb101b1df678529ce1cd945d891463db5fa850fc0c6a41e510876e32ac6e3c115b9f3c101b8a931ed191ddfeb6f60b2a33f2
-
SSDEEP
768:jvKMimxZoJyZ6FdMsB1p9ExNArZGdH3YobZkHkEV/U4vlA:jximboyYCxaUlfOkOZlA
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource b4c7895d3df188de4df6095d6ce668fe
Files
-
b4c7895d3df188de4df6095d6ce668fe.exe windows:4 windows x86 arch:x86
825157f91d109010f3a41755b03fdc27
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
advapi32
RegEnumKeyExA
RegOpenKeyExA
RegDeleteKeyA
RegCloseKey
kernel32
lstrcpyA
lstrlenA
Sleep
CreateProcessA
CloseHandle
WriteFile
MoveFileA
ReadFile
CreateFileA
GetModuleFileNameA
GetLastError
FindClose
FileTimeToSystemTime
FileTimeToLocalFileTime
GetDriveTypeA
FindFirstFileA
GetSystemTimeAsFileTime
SetEnvironmentVariableA
GetCurrentDirectoryA
SetCurrentDirectoryA
CreateDirectoryA
GetModuleHandleA
GetStartupInfoA
GetCommandLineA
GetVersionExA
GetFullPathNameA
ExitProcess
GetProcAddress
TerminateProcess
GetCurrentProcess
HeapFree
SetFilePointer
HeapAlloc
VirtualProtect
VirtualAlloc
GetSystemInfo
VirtualQuery
WideCharToMultiByte
GetStdHandle
UnhandledExceptionFilter
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
SetHandleCount
GetFileType
HeapDestroy
HeapCreate
VirtualFree
GetACP
GetOEMCP
GetCPInfo
LCMapStringA
MultiByteToWideChar
LCMapStringW
GetTimeZoneInformation
QueryPerformanceCounter
GetTickCount
GetCurrentThreadId
GetCurrentProcessId
HeapReAlloc
SetStdHandle
FlushFileBuffers
RtlUnwind
InterlockedExchange
CompareStringA
CompareStringW
LoadLibraryA
GetStringTypeA
GetStringTypeW
GetLocaleInfoA
HeapSize
SetEndOfFile
Sections
.text Size: 36KB - Virtual size: 32KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 8KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 7KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE